-
241
-
242
-
243
-
244
Data Security
Published 2013-07-01“…There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.). …”
Get full text
Article -
245
Jurisdiction and Security
Published 2022-11-01“… On June 16, 2022, the Canadian Association for Security and Intelligence Studies (CASIS)-Vancouver hosted a Digital Roundtable titled Jurisdiction and Security, conducted by Dr. …”
Get full text
Article -
246
-
247
Secure the Clones
Published 2012-05-01“…Currently no language-based mechanism supports secure object cloning. This paper proposes a type-based annotation system for defining modular copy policies for class-based object-oriented programs. …”
Get full text
Article -
248
-
249
The Burden of Security
Published 2020-03-01“…By analysing the evolution of security discourses in local Hindi newspapers and drawing on ethnography of everyday policing at the Kashi Vishvanath-Gyan Vapi compound, this article discusses moral frictions involved in securing a contested place of worship and argues that scopes and objects of securitisation can shift. …”
Get full text
Article -
250
-
251
-
252
Security on the Internet
Published 2008“…Due to these benefits, more and more companies are rushing to use the Internet for commercial reasons without considering in-depth security-related risks that are associated with the Internet. …”
Get full text
Thesis -
253
-
254
Circuits for security
Published 2023“…This gives rise to a need for better security for the vulnerable IOT. Physical unclonable function (PUF) is one of the techniques that are being used to provide security and SRAM PUF is one of the preferred type of PUF. …”
Get full text
Final Year Project (FYP) -
255
Bluetooth security
Published 2008“…Then we discuss Bluetooth security that focus on the key management, authentication and encryption.…”
Get full text
Thesis -
256
Cloud security
Published 2014“…However, it still has security issues such as data security. It does not offer the ability to encrypt the block and object storage at the time this project is proposed. …”
Get full text
Final Year Project (FYP) -
257
Information security
Published 2017“…This issue of Business Information Review takes a focused look at Information Security, and the role of information professionals in securing information systems and processes. …”
Get full text
Article -
258
Blinded by security
Published 2010“…</p><p>The final version of this paper will be published in 2011 by Springer in a volume on the migration-development-security nexus, edited by Thanh-Dam Truong and Desmond R. …”
Working paper -
259
Security of supply
Published 2007“…Paul Isbell revisits the energy security debate; John Gault considers European security and natural gas supplies; William C. …”
Journal article -
260